show episodes
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news.XenTegra is THE preferred IGEL national partner!
  continue reading
 
As the trends in digital transformation pivot faster than ever before, there is an imperative to understand the solutions available to your business. Presented by Dell Technologies, this podcast series is your opportunity to deep dive into the challenges that your business might be facing right now, and the solutions available to solve them.
  continue reading
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork
 
EE Times Current provides a deep dive into the most compelling stories in the electronics industry. Tune in to keep yourself current on what matters to design engineers and other tech industry professionals
  continue reading
 
StackChart Spotlight is a weekly series that focuses on a different category of tools for MSPs each episode. Come learn about what tools are the most popular, rank the best with MSPs, and what considerations to keep in mind when selecting the right tool for your organization.
  continue reading
 
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
  continue reading
 
Artwork

1
Cloud Conversations

Azure, Peter, Femke, Ru, and Kat

Unsubscribe
Unsubscribe
Mensal+
 
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
  continue reading
 
Artwork
 
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what’s happening in the tech space — from startups to industry leaders, emerging tech, and what’s ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
  continue reading
 
Loading …
show series
 
In this episode of Breaking Badness, we dive deep into the evolving world of Endpoint Detection and Response (EDR) and its critical role in modern cybersecurity. With threats advancing and the sheer volume of endpoint data skyrocketing, AI and deep learning are becoming gamechangers in threat detection and prevention. Join us as Carl Froggett, CIO …
  continue reading
 
In this episode we sit down Shyam Sankar, Chief Technology Officer (CTO) of Palantir Technologies. We will dive into a wide range of topics, from cyber regulation, software liability, navigating Federal/Defense cyber compliance and the need for digital defense of the modern national security ecosystem. - First off, for those unfamiliar with you and…
  continue reading
 
During this year's edition of .conf, Splunk's annual conference, we sat down with James Hodge, Chief Strategic Advisor for #Splunk EMEA. One of the main themes of #splunkconf24 was 'The SOC of the future'. That message shone through in many topics of conversation during the show. So we thought it would be interesting to have a conversation with Jam…
  continue reading
 
In this episode we sit down with Mark Simos to dive into his RSA Conference talk "You're Doing It Wrong - Common Security AntiPatterns" to dig into several painfully true anti-patterns in cybersecurity and how we often are our own worst enemy. - - First off, for those not familiar with you or your background, can you tell us a bit about that. - So …
  continue reading
 
Maddie Regis speaks with Tom Bowyer, Director of Security at Automox, about the intersection of IT and cybersecurity. Tom shares his career journey, the importance of collaboration between IT and security teams, and insights into SOC compliance reports. He emphasizes the need for transparency, experimentation, and proactive problem-solving in enhan…
  continue reading
 
There are many exciting announcements that are happening at this year’s annual IGEL DISRUPT event in Munich, one of which was the addition of the Island Enterprise Browser to the IGEL App Portal. In case you missed it, here is everything you need to know about the partnership between IGEL and Island and what it means for end-user computing. IGEL’s …
  continue reading
 
David van Heerden discusses the critical relationship between great IT and security. He emphasizes that true automation goes beyond simple digitization, advocating for the elimination of unnecessary processes. The conversation explores the importance of multi-factor authentication, IT service management (ITSM) practices, and the need for a user-cen…
  continue reading
 
In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
  continue reading
 
In this episode of Breaking Badness, we dive deep into the critical world of API security and governance, uncovering key strategies to keep data safe in today’s threat landscape. Special guests Matthias Friedlingsdorf (iVerify), Tristan Kalos (ESCAPE), and Aqsa Taylor (Gutsy) join the conversation to share their experiences with detecting advanced …
  continue reading
 
In this episode, the hosts discuss the critical vulnerabilities released in October's Patch Tuesday, focusing on notable CVEs, including a Windows netlogon elevation of privilege vulnerability and an RCE in the remote desktop client. They also address the CUPS vulnerability affecting Linux servers and the implications of Apple's recent updates that…
  continue reading
 
- First off, for folks not familiar with your background, can you tell us a bit about that and how you got to the role you're in now? - We see rapid adoption of AI and security inevitably trying to keep up, where should folks start? - There are some really interesting intersections when it comes to AI and supply chain, what are some of them? - We s…
  continue reading
 
- First off, for those who don't know you, can you tell us a bit about your background? - You've been providing a deep dive talk into how to become a CISO. I'm curious, what made you put together the presentation, and how has it been received so far when you've had a chance to deliver it? - You have broken down what you call "four stages of the jou…
  continue reading
 
UCL’s Dr. Sunny Bains talks parallelism, neural net efficiency and risk taking with Caltech’s Prof. Carver Mead. Now an emeritus professor, Mead has been instrumental in the development of chip design, and was one of the first employees of Noyce and Moore, which later became Intel. He’s also one of the founders of the field of neuromorphic engineer…
  continue reading
 
Both junior and senior security analysts encounter frustrating challenges with threat hunting, making it hard to really make it an integral part of daily SOC operations. How can we make things easier and less ad hoc for them? We sit down with Albert Caballero and Adriana Corona from SentinelOne to discuss this in depth. At its recent OneConnect eve…
  continue reading
 
In this episode of the Hands-On IT podcast, host Landon Miles discusses the Autonomous Endpoint Management (AEM) Manifesto, emphasizing the need for collaboration between IT Operations (ITOps) and Security Operations (SecOps). He outlines the core principles of the AEM Manifesto: automation, proactive security, and data harmonization, and provides …
  continue reading
 
In this episode of Breaking Badness, we dive into the rapidly evolving world of cybersecurity with three industry leaders: Raymond Dijkxhoorn, CEO of SURBL; Nabil Hannan, Field CISO atNetSPI; and Jason Mar-Tang, Field CISO at Pentera. They explore the critical role of domain reputation in combating phishing and spam, how AI is reshaping both offens…
  continue reading
 
In this episode we sit down with Amir Kessler and Aviram Shmueli of AppSec innovator Jit to dive into the complexities of the modern AppSec landscape and explore the emerging Application Security Posture Management (ASPM) ecosystem. - First off, for folks not familiar with your backgrounds, can you tell us a bit about both of your backgrounds and h…
  continue reading
 
On this episode of The Main Scoop, Greg Lotko and Daniel Newman sit down with Dr. Gloria Chance, founder and CEO of The Mousai Group, to discuss the current posturing of DEI initiatives across the technology industry, why diverse perspectives are key for creating non-biased AI models, and the importance of belonging and inclusivity.…
  continue reading
 
In this episode of Automox's Autonomous IT podcast, Ashley Smith speaks with Catie Adams from New Pig, who shares her journey in IT, her experience with Automox for patch management, and insights on the creating synergy between IT and security operations teams. Catie emphasizes the importance of collaboration in IT, offers advice for professionals …
  continue reading
 
Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and avail…
  continue reading
 
There is a lot of hype in the industry around AI, but behind the hype there is the reality. That reality is that AI really is impacting virtually every aspect of semiconductor design. However, its not as simple as taking general purpose AI solutions and hoping they work for EDA, the risks are too high and when dealing with parts per billion (or tri…
  continue reading
 
In this episode of Product Talk, host Peter Pflaster discusses the role of software agents in IT management with guests Carson Grogg and Tyler Schmidtke from the Automox engineering team. They explore the importance of agents in executing actions on endpoints, the engineering challenges in developing agents for various operating systems, and the ri…
  continue reading
 
In this special Black Hat edition of Breaking Badness, Part 2 of a 5 Part Series, we dive deep into the world of vulnerability management, cyber resilience, and supply chain security. Our expert guests—Jacob Graves, Director of Solution Architecture at Gutsy, Theresa Lanowitz, Chief Evangelist at Level Blue, Pukar Hamal, CEO at SecurityPal, and Vin…
  continue reading
 
In this episode, Ashley interviews Bob Antos from Trine University. They discuss his extensive experience in IT, particularly within the education sector. Bob shares insights on the challenges and opportunities in endpoint management, the importance of security, and the role of automation in maturing IT environments. The conversation highlights the…
  continue reading
 
In this episode of IT Insiders, Maddie Regis speaks with Ryan Braunstein and Mat Lee from Automox's security team about the evolution of automation in security operations. They discuss their career backgrounds, the day-to-day use of Automox for security tasks, and the innovative strategies they employ to enhance automation. The conversation also co…
  continue reading
 
The title of this episode of Techzine Talks on Tour is a (perhaps somewhat rhetorical) question Don Schuerman, the CTO of #Pegasystems asks the audience during #PegaWorld Inspire, Pega's annual flagship event. Sander sat down with him at the show to discuss how statistical AI and GenAI can help find an answer. During this conversation, Don and Sand…
  continue reading
 
In this special Black Hat edition of the Breaking Badness Cybersecurity Podcast, Part 1 of a 5 Part Series, we dive deepinto how artificial intelligence is transforming the cybersecurity landscape. Our guests—Mark Wojtasiak (VP of Product at Vectra AI), Carl Froggett (CIO at Deep Instinct), Dan Fernandez(Staff Product Manager at Chainguard), and Ma…
  continue reading
 
Welcome to the Dell Technologies podcast! In this episode, we dive into how the Dell Technologies APEX Cloud Platform for Microsoft Azure, co-engineered by Dell and Microsoft, brings the power of the cloud to your on-premises environment using Azure Stack HCI. This innovative solution ensures a seamless and unified cloud experience across both clou…
  continue reading
 
Welcome to the Dell Technologies podcast! In this episode, we explore how the Dell AI Factory helps customers unlock the value of Generative AI (GenAI). Join Dom Corsino, Dell Technologies' AI Business Development Lead for Australia and New Zealand, as he discusses the rapid transformation AI is bringing to businesses and the pressure enterprises f…
  continue reading
 
In this episode of Heroes of IT, Landon Miles interviews Mike Burroughs, the Global Head of IT at Shockwave Medical. They discuss Mike's extensive background in IT and cybersecurity, his experiences with using Automox, and the importance of automation in improving efficiency and work-life balance for IT teams. Mike shares valuable insights on manag…
  continue reading
 
“The recent global IT outage is an example of the need for more automation, not less.” In this episode, Jason Kikta discusses the importance of automation in IT and cybersecurity. Jason emphasizes that automation itself is not inherently dangerous, but rather the lack of proper testing and controls. He encourages listeners to automate tedious tasks…
  continue reading
 
In this special research edition of Breaking Badness, hosts Kali Fencl, Tim Helming, Sean McNee, and guest Sasha Angus from Sylla Intel dive deep into the world of cybercriminal campaigns targeting retailers. They explore how bad actors exploit the growing threatlandscape, discussing specific fraud tactics, infrastructure reuse, and ways organizati…
  continue reading
 
In this episode of Patch [FIX] Tuesday, Tom and Jason celebrate their 11th episode and reflect on the success of the Automox YouTube channel. They discuss a Windows Update RCE, YubiKey Security Advisories, and a Visio RCE. They emphasize the importance of patching the Windows Update vulnerability immediately due to its potential for exploitation. T…
  continue reading
 
Windows 10 goes end of life on the 14th of October 2025. By that date, Microsoft will stop providing free software updates from Windows update, no technical assistance will be offered and lastly, there will not be any more security fixes. Security fixes are a crucial part, and if you are on a system where a new vulnerability is exposed, and no more…
  continue reading
 
- For those that don't know you, can you tell us a bit about your background and your current role? - I know you help lead the ATLAS project for MITRE, what exactly is ATLAS and how did it come about? - The AI threat landscape is evolving quickly, as organizations are rapidly adopting GenAI, LLM's and AI more broadly. We are still flushing out some…
  continue reading
 
In this episode, Landon Miles discusses automation and common pitfalls to avoid. The four common pitfalls he identifies are: selecting the wrong tool, selecting the wrong problem, having bad mentalities, and not documenting anything. He shares anecdotes and insights to illustrate each pitfall and provides tips on how to avoid them.…
  continue reading
 
Kali Fencl and Daniel Schwalbe sat down with Lesley Carhart, aseasoned incident responder specializing in Operational Technology (OT) cybersecurity at Dragos, in person at BlackHat USA 2024. Lesley shares their journey, from their uniquebackground in avionics and electronics to becoming a leading expert in the field. We explore the evolving landsca…
  continue reading
 
Keeping bad guys out is always better than trying to detect breaches after they have happened. Many security vendors seem to have given up on that idea, however. That is, there's a lot of focus on an 'assume breach' attitude nowadays, not so much on 'assume our defenses will hold'. There are a lot of reasons why this is the case, reasons we have go…
  continue reading
 
On this episode of the Six Five Podcast Infrastructure Matters, host Steven Dickens is joined by Astadia's Chairman and CEO Scott Silk, for a conversation on strategies for successful mainframe modernization. Astadia is at the forefront of helping organizations transition from legacy mainframe systems to modern cloud-based solutions, facilitating g…
  continue reading
 
In this episode of Automate IT, David van Heerden discusses automating tedious and frustrating tasks in IT. He introduces a workflow automation called Worklets on demand, which can be used with Automox's API and a ticketing system to automate endpoint user tasks. By triggering the repair steps on the endpoint automatically, the need for scheduling,…
  continue reading
 
This episode originally aired March 14, 2024. In this episode, Jason Kikta, the CISO at Automox, shares his background with the early days of Linux and highlights its importance in the computing industry. He discusses the history of Linux, its early challenges, and the advancements it has made over the years. Jason emphasizes the role of Linux in d…
  continue reading
 
In this episode of Enterprising Insights, Futurum Group Enterprise Applications Research Director Keith Kirkpatrick provides a preview of his fall conference schedule, focusing on the events he will be attending, the key items he hopes to learn, and how these developments may impact the enterprise applications market. He will then move to the Rant …
  continue reading
 
Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply …
  continue reading
 
In this episode we sit down with GenAI and Security Leader Steve Wilson to discuss securing the explosive adoption of GenAI and LLM's. Steve is the leader of the OWASP Top 10 for LLM's and the upcoming book The Developer's Playbook for LLM Security: Building Secure AI Applications - - First off, for those not familiar with your background, can you …
  continue reading
 
In this episode of Marketing: Art & Science CMO advisor and host Lisa Martin welcomes business leader and CMO of NetApp, Gabie Boko. In their engaging conversation, Gabie shares with us her background, double clicks on what stakeholders want from B2B marketing leaders, how she's using data to pull the levers of art and science in marketing, and how…
  continue reading
 
In this episode, Peter Pflaster interviews Amelia Vacante from the Automox customer education team. They discuss the philosophy behind Automox University and the importance of customer education. They highlight the simplicity and ease of use of Automox and how Automox University aims to provide concise and relevant content to help users quickly und…
  continue reading
 
On this episode of Infrastructure Matters, Steven Dickens is joined by IBM's Chris Berry, Distinguished Engineer - Processor Development, and Susan Eickhoff, Director, IBM Z Processor Development for a conversation on the latest AI acceleration innovations unveiled by IBM at the Hot Chips conference. Their discussion covers: The key features of IBM…
  continue reading
 
Organizations invest $200 billion globally in IT security. However, data breaches and ransomware attacks are still rampant. How can that be? What does this say about the impact of all those investments? We discuss these and other topics with Filip Verloy, Field CTO at Rubrik, one of the big players in this space. At RSA Conference earlier this year…
  continue reading
 
Loading …

Guia rápido de referências